In this study, we developed a desktop agent system that automatically operates a GUI as desired by the user through natural language interaction between the user and the agent. In this system, the user can interact wi...
详细信息
Type II diabetes mellitus, on the other hand has been regarded as one of the growing concerns globally and thus clearly raises the need for making accurate forecasts of diabetes. The risk for Type II diabetes can be p...
详细信息
The proceedings contain 31 papers. The topics discussed include: energy management systems and smart phones: a systematic literature survey;real-time instance segmentation for low-cost mobile robot systems based on co...
ISBN:
(纸本)9781665432085
The proceedings contain 31 papers. The topics discussed include: energy management systems and smart phones: a systematic literature survey;real-time instance segmentation for low-cost mobile robot systems based on computation offloading;fault-tolerant orchestration of bags-of-tasks with application-directed checkpointing in a distributed environment;a traffic prediction assisted routing algorithm for elastic optical networks;Gibbs free-energy prediction method for iron-base alloy materials based on deep learning;XAI-AV: explainable artificial intelligence for trust management in autonomous vehicles;a survey of encrypted malicious traffic detection;and classification of soil images using convolution neural networks.
The proceedings contain 24 papers. The topics discussed include: a novel collaborative representation method for hyperspectral image classification;developing energy autonomous and cable-less multi-gateway LoRa networ...
ISBN:
(纸本)9798350302561
The proceedings contain 24 papers. The topics discussed include: a novel collaborative representation method for hyperspectral image classification;developing energy autonomous and cable-less multi-gateway LoRa networks;SLA-SCA: secure and lightweight authentication and key agreement mechanism for smart city applications;a multimodal fusion depression recognition assisted decision-making system based on EEG and speech signals;platform construction to protect portraits of others;design of a secure machine learning-based malware detection and analysis scheme;MalwareCLIP: towards a scalable and explainable image-based malware classification;and out-of-distribution detection with confidence deep reinforcement learning.
The proceedings contain 54 papers. The topics discussed include: temperature dependent SVR and ANN based I-V models for GaN HEMTs;cyber-attacks on smart home energy management systems under aggregators;android malware...
ISBN:
(纸本)9781728120355
The proceedings contain 54 papers. The topics discussed include: temperature dependent SVR and ANN based I-V models for GaN HEMTs;cyber-attacks on smart home energy management systems under aggregators;android malware detection using static features and machine learning;Power attack and detection technology in data centers: a survey;genetic algorithm augmented convolutional neural network for image recognition applications;algorithm appreciation: algorithmic performance, developmental processes, and user interactions;exploring quantization-aware training on a convolution neural network;and joint carrier frequency offset, timing offset and channel estimation in two-way relays.
As an example of the application of AI and data science technologies to the field of performing arts, we first discuss the analysis of Edo Kouta through text mining. In this study, latent semantic indexing and cluster...
详细信息
The proceedings contain 19 papers. The topics discussed include: on the security of authenticated key agreement schemes for e-healthcare;internet-of-explainable-digital-twins: a case study of versatile corn production...
ISBN:
(纸本)9781665486170
The proceedings contain 19 papers. The topics discussed include: on the security of authenticated key agreement schemes for e-healthcare;internet-of-explainable-digital-twins: a case study of versatile corn production ecosystem;secure transmission in cell-free massive MIMO network with phase noise;fraud detection during financial transactions using machine learning and deep learning techniques;medium and short-term prediction of power system load based on improved LSTM algorithm;a rotation speed measurement system based on millimeter wave;an efficient authentication technique using convolution Chebyshev chaotic maps for TMIS;and examining the influence of national digital identity and smart pass platform on accelerating the processes of digital transformation.
To address the growing demand of high-speed and low-latency communications in access network segments, IEEE 802.3ca task force developed Next Generation Ethernet Passive Optical Network (NG-EPON). In this network, an ...
详细信息
ISBN:
(数字)9791188428137
ISBN:
(纸本)9798331507602
To address the growing demand of high-speed and low-latency communications in access network segments, IEEE 802.3ca task force developed Next Generation Ethernet Passive Optical Network (NG-EPON). In this network, an Optical Line Terminal (OLT) and an Optical Network Unit (ONU) can have multiple transceivers which allow them to communicate through multiple channels simultaneously (channel bonding) to achieve aggregated high transmission rate. Due to the use of a large number of transceivers in this network, the energy consumption should be supposedly high. In this paper, we propose an Adaptive Cyclic Transmission Operation (ACTO) scheme for NG-EPON with the objective of reducing energy consumption using sleep mode without compromising performance requirements. In particular, ACTO sets transmission cycle duration of each channel taking into consideration the traffic delay performance requirements. It also presents mechanisms how energy consumption for the idle channel(s) can be minimized and how signaling associated energy consumption in OLT/ONU transceivers can be saved. Performance evaluated based on simulation shows that the proposed solution conserves 15% of energy in ONUs even during high traffic load conditions. Furthermore, the OLT side energy consumption is also reduced by approximately 13.5% in ACTO compared to a conventional solution.
The proceedings contain 31 papers. The topics discussed include: a perfect secrecy communication scheme based on strictly typical artificial noise and cascaded secure codes;OCW: enhancing few-shot learning with optimi...
ISBN:
(纸本)9798350349832
The proceedings contain 31 papers. The topics discussed include: a perfect secrecy communication scheme based on strictly typical artificial noise and cascaded secure codes;OCW: enhancing few-shot learning with optimized class-weighting methods;fuzzy logic-based preliminary risk assessment for a supervised federated learning solution in predicting student results;penetration testing operating systems: exploiting vulnerabilities;route planning algorithm based on irradiation requirements for laser-guided airborne ground weapons;DNN-based speech enhancement on microcontrollers;security analysis and improvement of authenticated key agreement protocol for remote patient monitoring IoMT;blockchain-assisted secure and trusted ticketing system for outsourced premier league;and machine learning-based security mechanism for detecting phishing attacks.
MPdist is a distance measure which considers two time series to be similar if they share many similar subsequences. However, computing MPdist can be slow, especially for large time series. We propose a technique for t...
详细信息
暂无评论